CVE-2024-6322: Grafana plugin data sources vulnerable to access control bypass
Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
References
- github.com/advisories/GHSA-hh8p-374f-qgr5
- github.com/grafana/grafana
- github.com/grafana/grafana/commit/4cb3ba5d1a7ab8b9676034e89dada2fcde1766ef
- github.com/grafana/grafana/commit/9cdba084a9100c6b11d32eef9d2bd53656c6964a
- grafana.com/security/security-advisories/cve-2024-6322
- nvd.nist.gov/vuln/detail/CVE-2024-6322
Detect and mitigate CVE-2024-6322 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →